Skip to main content

Businesses, cyber security firms are coming up with creative ways to fight hackers

” id=”attachment_586967″]businesses and cyber security firms are coming up with creative ways to fight hackers laptop hacker
”[Image
Hackers continue to play havoc with our computers and networks. Many viruses and other traps are designed primarily to damage your system in some way—by, say, corrupting your data, scrambling the operating system, or crashing the system somehow.

Then there are the more nefarious forms of hacking that entail exploitation, by either accessing his or her financial data and using it to embezzle funds, or by encrypting or removing data from the victim’s PC and then holding it hostage, refusing to restore the data until a fee is paid.

One of the most nefarious of these viruses is Cryptolocker, a nasty little piece of ransomware that, though it has been around for a while (and therefore it’s “treated” by most antivirus software), PC and computer security technicians report that they are still treating CryptoLocker-infected machines.

They’re also busy healing many PCs inflicted by closely related viruses, such as Cryptowall on a regular basis. Ransomware and other data-hijacking viruses, in addition to other types of data hacking methods, costs companies millions in recovery and other fees each year.

In response, an increasing number of companies are resorting to countermeasures, such as creating decoy servers that collect information on would-be hackers, staking out online forums to watch out for stolen data, and even planting misinformation or alluring fakes on company servers to confuse and thus help snare thieves. As former assistant secretary for policy at the Department of Homeland Security, Stewart A. Baker told The New York Times recently, some security experts are advising companies to take even more proactive precautions.

“Companies want better results than are being delivered by law enforcement,” Baker says. Baker went on to question whether government agencies have the resources to monitor corporate networks, and whether businesses would willingly give the government increased access to its networks.

Red Sky Alliance vice president Jeffery L. Stutzman thinks there should be a “Second Amendment right in cyber,” alluding to the right to bear arms. Red Sky Alliance, a cyber-security firm, handles intelligence for several top corporations—many of which are trying to gauge just how much hacking prevention the company itself can take on. What are the ramifications of trying to essentially take the law into your hands?

The problem with any non-law enforcement agency taking matters into its own hands is that often doing so entails performing acts that are illegal to all but law enforcement bodies, and often even law enforcement must acquire warrants and navigate through other legal hurdles to justify many types of investigative activities.

In addition, cyber criminals often conduct their activities through innocent third-party machines, making it difficult to single out the actual criminals. Besides, companies that try to find and retaliate against hackers, especially if the retaliation entails recovering data from the alleged hacker’s computers, are, by the nature of the act itself, committing trespassing and theft.

But that’s not to say that countermeasures always fail or cause additional problems. Samir Kapuria, vice president of Symantec’s Cyber Security Group, recently talked about how his company helped one of its clients plant counterfeit blueprints. The blueprints were subsequently found for sale on the Internet and traced back to their source, saving Symantec’s client millions of dollars.

As our lives and businesses become more and more data-driven, it also becomes increasingly more important for data to retain its integrity. The perpetual back-and-forth between hackers and legitimate companies, as unfortunate as it is, won’t let up anytime soon. However, you can ward off most cyber-thieves and save yourself a lot of grief by remaining vigilant.

To close, here are seven basic ways to help you protect your data. If you don’t take these precautions you’ll likely experience some sort of catastrophic data loss.

  • Back up your data and create recovery discs and drives. It’s always much safer to have at least one set of backup files off-site. Use the backup software’s automatic scheduling as well.
  • Use virus and security software, and make sure you keep it updated.
  • Delete all unsolicited requests for personal information.
  • Know exactly who and why—before entering your information on a Website.
  • Think before clicking a link or banner. You have no idea what it does, or where it will take you.
  • Don’t install software from untrusted or unknown sources.
  • Be careful about using banking and other high-security apps over public and free Wi-Fi hotspots, as they’re generally unsecure.

Editors' Recommendations

Topics
William Harrel
William Harrel has been writing about computer technology for well over 25 years. He has authored or coauthored 20…
How to delete your Spotify account on desktop and mobile
An iPhone with the Stats for Spotify screen on it being held in a hand.

Spotify is home to a bountiful trove of music. With over 615 million users connected to the platform, it’s no wonder it’s one of the biggest music-streaming platforms in town. Still, sometimes we need to put aside a little extra pocket change every month. And one of the first things to go are monthly subscriptions. We know it stinks, but this doesn’t mean your Spotify account needs to disappear forever.

Read more
The best tablets in 2024: top 11 tablets you can buy now
Disney+ app on the iPad Air 5.

As much as we love having the best smartphones in our pockets, there are times when those small screens don't cut it and we just need a larger display. That's when you turn to a tablet, which is great for being productive on the go and can be a awesome way to unwind and relax too. While the tablet market really took off after the iPad, it has grown to be quite diverse with a huge variety of products — from great budget options to powerhouses for professionals.

We've tried out a lot of tablets here at Digital Trends, from the workhorses for pros to tablets that are made for kids and even seniors -- there's a tablet for every person and every budget. For most people, though, we think Apple's iPad Air is the best overall tablet — especially if you're already invested in the Apple ecosystem. But if you're not an Apple user, that's fine too; there are plenty of other great options that you'll find in this roundup.

Read more
How to delete a file from Google Drive on desktop and mobile
Google Drive in Chrome on a MacBook.

Google Drive is an excellent cloud storage solution that can be accessed from numerous devices. Whether you do most of your Google Drive uploading or downloading from a PC, Chromebook, or mobile device, there’s going to come a time when you’ll need to delete a file (or two). Fortunately, the deletion process couldn’t be more straightforward. We’ve also put together this helpful guide to show you how to trash your Drive content a couple of different ways.

Read more